IFIP Information Security Conference & Privacy Conference - IFIP Technical Commitee 11

                                                                  

IFIP SEC 2016

Keynotes

Bart de Decker, KU Leven, Belgium, Vice Chair IFIP TC11
IFIP-SEC2016-Reception_De-Decker-Bart_160530.pdf

Bart Preneel, COSIC KU Leuven and iMinds, Belgium
IFIP-SEC2016-Keynote_Preneel-Bart_system-security-after-snowden-160531.pdf

 

IFIP SEC 2016 Programm

Monday May 30th 2016

Invited Talk:
Crazy Time - Exploiting Software Without Bugs - Herbert Bos

Session 1a: IFIP SEC - Cryptographic Protocols (session chair: Frédéric Cuppens)

Coercion-resistant Proxy Voting
Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi and Melanie Volkamer

A Posteriori Openable Public Key Encryption
Xavier Bultel and Pascal Lafourcade

Multicast Delayed Authentication For Streaming Synchrophasor Data in the Smart Grid
Sérgio Câmara, Dhananjay Anand, Victoria Pillitteri and Luiz Carmo

Session 1b: IFIP SEC - Human Aspects of Security I (session chair: Rossouw Von Solms)

Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research
Gurpreet Dhillon, Spyridon Samonas and Ugo Etudo

Evaluating CVSS Base Score Using Vulnerability Rewards Programs
Awad Younis, Yashwant Malaiya and Indrajit Ray

Defining Objectives For Preventing Cyberstalking
Gurpreet Dhillon, Chandrashekar Challa and Kane Smith

Session 2a: IFIP SEC - Cyber Infrastructure (session chair: Indrajit Ray)

Using Process Invariants to Detect Cyber Attacks on a Water Treatment System
Sridhar Adepu and Aditya Mathur

Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud
Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens and Vincent Frey

Software Defined Networking Reactive Stateful Firewall
Salaheddine Zerkane, Fréderic Cuppens, David Espes and Philippe Le Parc

Session 2b: IFIP SEC - Human Aspects of Security II (session chair: Gurpreet Dhillon)

Teaching Phishing-Security: Which Way is Best?
Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer, Peter Mayer, Alexandra Kunz, Philipp Rack and Daniel Lehmann

On Gender Specific Perception of Data Sharing in Japan
Markus Tschersich, Shinsaku Kiyomoto, Sebastian Pape, Toru Nakamura, Gökhan Bal, Haruo Takasaki and Kai Rannenberg

TORPEDO: TOoltip-poweRed Phishing Email DetectiOn
Melanie Volkamer, Karen Renaud and Benjamin Reinheimer

Session 3a: IFIP SEC - Social Networks (session chair: Carlos Rieder)

SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks
Dieudonne Mulamba, Indrajit Ray and Indrakshi Ray

Collateral Damage in Online Social Networks: Apps, Friends and Privacy Interdependence
Iraklis Symeonidis, Fateme Shirazi, Gergely Biczók, Cristina Perez-Sola and Bart Preneel

Session 3b: Industrial Track (session chair: Bart De Decker)

Security Strategy of a Hyperscale Cloud Provider
Bruno Schroder, Microsoft

Detecting Crypto Currency Mining in Corporate Environments
Jan D'Herdt, IBM

Building a Powerful Capturing and Analysis System based on ELK, Docker and Netflow
Pieter Van Goethem, Cronos Security

Tuesday May 31st 2016

IFIP SEC Kristian Beckman Award
The Post-Snowden Threat Landscape - Bart Preneel

Session 4a: IFIP SEC - Software Vulnerabilities (session chair: Philippos Peleties)

Automated Source Code Instrumentation for Vulnerability Discovery
Hongzhe Li, Jaesang Oh, Hakjoo Oh and Heejo Lee

An Information Flow-based Taxonomy to Understand the Nature of Software Vulnerabilities
Daniela Oliveira, Jedidiah Crandall, Harry Kalodner, Nicole Morin, Megan Maher, Jesus Navarro and Felix Emiliano

Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Scanners
Enrico Bazzoli, Claudio Criscione, Federico Maggi and Stefano Zanero

Session 4b: IFIP WG11.5 Workshop - IT Assurance & Audit

Vision on the Future of IT Assurance
Abbas Shahim, chairman

The Soft Side of IT Project Management
René Hombergen

Controls for Digital Payment Services
Arne de Boer

Session 5a: IFIP SEC - TPM and Internet of Things (session chair: Yuko Murayama)

A Utility-based Reputation Model for the Internet of Things
Benjamin Aziz, Paul Fremantle, Rui Wei and Alvaro Arenas

Advanced Remote Firmware Upgrades Using TPM 2.0
Andreas Fuchs, Christoph Krauß and Jürgen Repp

Session 5b: IFIP WG11.5 Workshop - IT Assurance & Audit

A View on Assurance within Digital Information Chains
René Matthijsse

Information Assurance in the Modern Age
Stef Schinagl

IT Assurance Trends 2016
Barry Derksen

Session 6a: IFIP SEC - Sidechannel Analysis (session chair: Jerzy Nawrocki)

RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks
Yuan Zhao, Jingqiang Lin, Wuqiong Pan, Cong Xue, Fangyu Zheng and Ziqiang Ma

Uncertainly? No, it's very certainly! Recovering the Key from Guessing Entropy enhanced side channel distinguishers
Changhai Ou, Wang Zhu, Degang Sun, Xinping Zhou and Juan Ai

Session 6b: IFIP WG11.5 Workshop - IT Assurance & Audit

The CIO in the Boardroom versus the Three Lines of Defense
Aart van der Vlist

Assessing the Security of Cyber-Physical Systems - a Logic-Based Approach
Laurens Lemaire

How to avoid fraudulent IT products violating Ethical Principles; Code of Conduct should order IT Audits
Sebastian Paans

Wednesday June 1st 2016

Session 7a: IFIP SEC - Software Security (session chair: Nora Cuppens)

Advanced or not? A comparative study of the use of anti-debugging and anti-VM techniques in generic and targeted malware
Ping Chen, Lieven Desmet, Christophe Huygens and Wouter Joosen

NativeProtector: Protecting Android Applications by Isolating and Intercepting Third-Party Native Libraries
Yu-Yang Hong, Yu-Ping Wang and Jie Yin

A progress-sensitive flow-sensitive inlined information-flow control monitor
Andrew Bedford, Stephen Chong, Josee Desharnais and Nadia Tawbi

Session 7b: IFIP SEC - Privacy (session chair: Kai Rannenberg)

Deducing User Presence From Inter-Message Intervals in Home Automation Systems
Frederik Möllers and Christoph Sorge

Privacy by design principles in design of new generation cognitive assistive technologies
Ella Kolkowska and Annica Kristoffersson

A trustless privacy-preserving reputation system
Alexander Schaub, Omar Hasan, Rémi Bazin and Lionel Brunie

Invited Talk: The risk-based approach to privacy: prospects and challenges - Daniel Le Métayer

OSA Award

IFIP SEC Best Student Paper Award and Closing